2015
DOI: 10.1007/978-3-319-26362-5_26
|View full text |Cite
|
Sign up to set email alerts
|

$$\textsc {BotWatcher}$$

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Once adversaries have completed Weaponization stage they should find a way to deliver their malicious payload to intended targets [36], [80]- [82]. The most common methods of malicious payload delivery by banking Trojans are email attachments, social engineering and drive by download [17], [20], [23], [31].…”
Section: Deliverymentioning
confidence: 99%
See 1 more Smart Citation
“…Once adversaries have completed Weaponization stage they should find a way to deliver their malicious payload to intended targets [36], [80]- [82]. The most common methods of malicious payload delivery by banking Trojans are email attachments, social engineering and drive by download [17], [20], [23], [31].…”
Section: Deliverymentioning
confidence: 99%
“…The domain name can be dynamically generated by an algorithm (Domain Generation Algorithm) that is known to the attacker and the malware [36], [82]. Unlike cache poisoning this mechanism produces random domain name depending on the algorithm which also creates more polymorphic behaviour of the malware and makes it even stealthier [80], [82]. The difference between this technique and the cache poisoning attack is that in the cache poisoning the malware makes use of the domain cached in victim DNS while in this mechanism the malware produces a random domain name [31].…”
Section: Generated Domain Names;mentioning
confidence: 99%